CPS | Before / After Images Security & Risk Analysis

wordpress.org/plugins/surbma-before-after

Simply add a before / after image to any WordPress website.

10 active installs v2.2 PHP 7.4+ WP 5.5+ Updated Jan 1, 2025
afterbeforeimagepicturesurbma
92
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is CPS | Before / After Images Safe to Use in 2026?

Generally Safe

Score 92/100

CPS | Before / After Images has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs Updated 1yr ago
Risk Assessment

The surbma-before-after plugin version 2.2 demonstrates a generally good security posture based on the provided static analysis. The plugin utilizes prepared statements for all SQL queries and properly escapes all identified output, which are excellent security practices. Furthermore, the absence of file operations, external HTTP requests, and known vulnerabilities in its history further strengthens its security profile. The limited attack surface, consisting of a single shortcode with no apparent direct vulnerabilities, also contributes to its favorable security assessment. However, the complete lack of nonce checks and capability checks across all entry points, including the shortcode, represents a significant concern. This absence means that potentially any user, regardless of their role or logged-in status, could interact with the plugin's functionality, opening the door to certain types of attacks if the shortcode's functionality is not inherently benign or if it interacts with user-controlled data in a sensitive way. While the current data shows no critical taint flows or direct dangerous functions, the lack of authentication and authorization checks is a fundamental security weakness that should be addressed.

Key Concerns

  • Missing nonce checks on shortcodes
  • Missing capability checks on shortcodes
Vulnerabilities
None known

CPS | Before / After Images Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 17, 2026

CPS | Before / After Images Code Analysis

Dangerous Functions
0
Raw SQL Queries
0
0 prepared
Unescaped Output
0
8 escaped
Nonce Checks
0
Capability Checks
0
File Operations
0
External Requests
0
Bundled Libraries
0

Output Escaping

100% escaped8 total outputs
Attack Surface

CPS | Before / After Images Attack Surface

Entry Points1
Unprotected0

Shortcodes 1

[surbma-before-after] surbma-before-after.php:37
WordPress Hooks 3
actioninitsurbma-before-after.php:23
actionwp_enqueue_scriptssurbma-before-after.php:27
actionwp_footersurbma-before-after.php:33
Maintenance & Trust

CPS | Before / After Images Maintenance & Trust

Maintenance Signals

WordPress version tested6.7.5
Last updatedJan 1, 2025
PHP min version7.4
Downloads2K

Community Trust

Rating0/100
Number of ratings0
Active installs10
Developer Profile

CPS | Before / After Images Developer Profile

Surbma

27 plugins · 30K total installs

71
trust score
Avg Security Score
88/100
Avg Patch Time
127 days
View full developer profile
Detection Fingerprints

How We Detect CPS | Before / After Images

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/surbma-before-after/js/jquery.event.move.js/wp-content/plugins/surbma-before-after/js/jquery.twentytwenty.js/wp-content/plugins/surbma-before-after/css/twentytwenty.css
Version Parameters
surbma-before-after/js/jquery.event.move.js?ver=surbma-before-after/js/jquery.twentytwenty.js?ver=surbma-before-after/css/twentytwenty.css?ver=

HTML / DOM Fingerprints

CSS Classes
twentytwenty-container
Shortcode Output
<div class="twentytwenty-container"><img src="
FAQ

Frequently Asked Questions about CPS | Before / After Images